Messaging Security School

SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge workers.

What is messaging security? The answer differs for every enterprise. To some, it means keeping malicious code out of end-users' inboxes. To others it's all about wireless devices and mobile malware. Still others know how critical it is to keep tabs on instant messaging use. Yet an effective enterprise messaging security strategy incorporates all these elements and more.

SearchSecurity.com has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge workers. Each of the lessons below is comprised of a webcast, technical tip, podcast and a quiz, and all are available on-demand for your convenience.

Spam 2.0: New threats and new strategiesInstructor: Michael Cobb, CISSP-ISSAP, Cobweb Applications Ltd.NEW It's no wonder the spam problem continues unabated. The proliferation of botnets and profit motives are spurring new spam techniques that are getting through filters and clogging inboxes. Innovative techniques, such as embedding them in PDFs or within images, are tricking spam filters and users. While inroads have been made, the war on spam has certainly not been won. Instead, new battle lines are being re-drawn and security professionals must stay on top of these emerging tricks.

-->

-->

Managing traffic: Keeping content where it belongsInstructor: Mike Rothman, president and principal analyst, Security Incite As business needs demand that customers and partners receive sensitive enterprise data, there is an increased need to protect outbound messaging content. Learn about the product and technology options on the market today to protect outbound messaging content, and get advice on how to establish sound messaging business processes.

@34775 The changing threat of email attacksInstructor: Mike Rothman, president and principal analyst, Security Incite Email threats have evolved from the basic mass-mailing viruses and worms of yesteryear into the advanced image-based phishing and newsletter-hijacking attacks that are wreaking havoc in today's enterprise environment. Learn why these threats go far beyond the traditional problems that administrators and security managers have faced in the past, and how best to align messaging defenses to meet tomorrow's challenges.

Defending mobile devices from viruses, spyware and malwareInstructor: Sandra Kay Miller, technical editor, Information Security magazine There has been a noticable rise in the number of unique mobile malware threats facing enterprise devices. This lesson will serve as a primer on the top mobile threat vectors -- including malware from the network, other devices, SMS and more -- and misconceptions about mobile malware, plus methods to mitigate emerging mobile threats.

Essential practices for securing mobile devicesInstructor: Lisa Phifer, VP, Core Competence Inc. For workers who conduct their business on the go, mobile devices represent a critical lifeline to enterprise applications and data, but precautions are required to avoid enterprise network breaches and private data disclosures. In this lesson, Lisa Phifer examines inherent weaknesses in mobile messaging devices, and discusses not only how to lock down mobile platforms to protect against emerging threats and risky end-user behaviors, but also how to ensure Bluetooth-enabled handsets aren't vulnerable to attack.

@12957 Secure instant messagingInstructor: Michael Cobb, CISSP-ISSAP, Cobweb Applications Ltd. Instant messaging is the most rapidly adopted communications medium in history and it's already become an indispensable business tool for many. But like all Internet-based services, IM faces a number of complicated security issues and IM users are always at risk of falling prey to attacks. In this lesson, Michael Cobb offers an overview of the IM security landscape, an update on the latest attacks and some quick tips for safer IM use.

Countermeasures for malicious email codeInstructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.

Securing Microsoft ExchangeInstructor: Lee Benjamin, Microsoft MVP, ExchangeGuy Consulting Exchange Server is arguably the most widely used enterprise messaging system in the market today. What's more, Microsoft is planning for a major revamp pf the product in 2007. This lesson will explain how to protect your Exchange 2003 environment today from spam, malware and Web-based attacks, and what to anticipate from the new features coming in Exchange Server 2007.

Final exam After you've completed all the lessons in SearchSecurity.com's Messaging Security School, take this final exam to assess your knowledge of identity and access management based on what you've learned in this school.

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy